[go: up one dir, main page]

0% found this document useful (0 votes)
14 views16 pages

BC Unit1notes

Uploaded by

Ishita Kolluru
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
14 views16 pages

BC Unit1notes

Uploaded by

Ishita Kolluru
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 16

CSE Department 19ECS459

Module 1: Blockchain Fundamentals

Tracing blockchain Origin: The Double Spend problem, Byzantine Generals'


Computing Problems.
Blockchain concepts: How Blockchain works, Centralization vs. Decentralization,
Distributed Consensus, Consensus without identity using a blockchain, Incentives and
proof of work, Cryptocurrency, NFTS, Mining.
Types of blockchains: Public Blockchain, Private Blockchain, Semi-Private Blockchain,
Sidechains. Blockchain Vulnerabilities.

1.Tracing blockchain Origin:


A blockchain was created by a person (or group of people) using the name (or pseudonym)
Satoshi Nakamoto in 2008 to serve as the public distributed ledger for bitcoin cryptocurrency
transactions, based on previous work by Stuart Haber, W. Scott Stornetta, and Dave Bayer.

1.1 The Double Spend problem

The double spend problem is a fundamental challenge in digital currency systems,


including blockchain-based cryptocurrencies. It refers to the potential risk of spending
the same unit of currency more than once, essentially creating counterfeit or fraudulent
transactions.
In traditional financial systems, double spending is prevented by centralized
authorities such as banks that maintain a central ledger and verify transactions.
However, in decentralized cryptocurrencies like Bitcoin, where there is no central
authority, a solution was needed to address this issue.

Blockchain technology solves the double spend problem through a consensus


mechanism called Proof of Work (PoW) or other consensus algorithms like Proof of
Stake (PoS). Here's how it works:

a) Transaction broadcasting: When a user initiates a transaction in a blockchain


network, it is broadcasted to all the participants or nodes in the network.

b) Verification and inclusion in blocks: Miners (in PoW) or validators (in PoS)
compete to validate transactions and create new blocks. They verify the
transaction's legitimacy by checking factors such as the available funds, digital
signatures, and transaction history. Once verified, the transaction is included in
a block.

c) Block confirmation: The newly created block containing the transaction is added
to the blockchain. In PoW, this involves solving a computationally intensive
mathematical puzzle, while in PoS, validators are chosen based on their stake and
consensus rules.

1
CSE Department 19ECS459

d) Consensus and chain selection: As the blockchain grows, subsequent blocks are
added, forming a chain of blocks. Consensus mechanisms ensure that the
majority of participants agree on the validity and order of the blocks. This
agreement prevents double spending by establishing a single, agreed-upon
transaction history.
By utilizing a decentralized network, consensus mechanisms, and cryptographic
techniques, blockchain technology effectively prevents the double spend problem.
However, it's important to note that in some rare cases, a temporary "fork" in the
blockchain can occur, resulting in two competing chains with conflicting transactions.
This situation can create a small window for potential double spending until the
consensus mechanism resolves the fork by selecting one chain as the valid one.
Nevertheless, these occurrences are rare and typically self-correcting within the
blockchain network.

1.2 Byzantine Generals' Computing Problems

The Byzantine Generals' Problem is a classical problem in distributed computing that


deals with the challenge of achieving consensus in a network of nodes (generals) that
may exhibit faulty or malicious behavior. The problem was introduced by Leslie Lamport,
Robert Shostak, and Marshall Pease in 1982.
In the Byzantine Generals' Problem, a group of generals, each commanding a division
of an army, surround an enemy city. The generals need to decide whether to attack or
retreat, and they must reach a consensus on the decision. However, some of the
generals may be traitors and can send conflicting messages to undermine the decision-
making process. The goal is to devise a protocol that allows loyal generals to reach a
consensus despite the presence of traitorous generals.

The problem can be generalized to a distributed computing context, where a network of


nodes needs to agree on a common value or outcome in the presence of faulty or
malicious nodes. The Byzantine Generals' Problem highlights the challenges of
coordinating consensus in a decentralized and potentially unreliable system.

Solving the Byzantine Generals' Problem requires a consensus algorithm that can
tolerate Byzantine faults, which include nodes that may send contradictory or
misleading information. Several consensus algorithms have been developed to address
this problem, with the most well-known being the Byzantine Fault Tolerance (BFT)
algorithms.

BFT algorithms, such as Practical Byzantine Fault Tolerance (PBFT) and Byzantine
Fault Tolerant Replication (BFT-R), aim to achieve consensus by having nodes
exchange messages, validate them, and reach agreement on the order and validity of
transactions or decisions. These algorithms employ cryptographic techniques,
redundancy, and voting mechanisms to ensure that the majority of honest nodes agree
on a consistent decision, even in the presence of Byzantine faults.

The Byzantine Generals' Problem and its solutions have significant implications for
distributed systems, including blockchain technology. Byzantine Fault Tolerance

2
CSE Department 19ECS459

algorithms are used in blockchain consensus mechanisms like Practical Byzantine Fault
Tolerance (PBFT) and Byzantine Fault Tolerant Replication (BFT-R). These algorithms
provide a means for achieving consensus in decentralized networks, where nodes may be
untrusted or exhibit faulty behavior.

2. Blockchain concepts
Terminologies
Blockchain: Blockchain is a decentralized and distributed digital ledger technology that allows
multiple parties to maintain a shared database without the need for a central authority. It
provides transparency, security, and immutability to various types of transactions and data.
Distributed Network: A blockchain consists of a network of computers, known as nodes, that
work together to maintain and validate the blockchain. Each node has a copy of the entire
blockchain database.
Blocks: Transactions and data are grouped into blocks. A block contains a list of transactions,
a timestamp, and a unique identifier called a hash. The hash is generated using a cryptographic
hash function, which ensures the integrity and security of the block.
Hashing: The hash of each block is based on the data it contains, as well as the hash of the
previous block in the chain. This linking of blocks using their hashes creates the "chain" in
blockchain. Any change in a block's data will alter its hash, making it evident that the block
has been tampered with.
Consensus Mechanism: Blockchain networks use a consensus mechanism to agree on the
state of the blockchain and validate new transactions. The most well-known consensus
mechanism is Proof of Work (PoW), used by Bitcoin, where miners compete to solve complex
mathematical puzzles to add new blocks to the chain. Other consensus mechanisms, like Proof
of Stake (PoS), exist as well.
Validation and Confirmation: When a new transaction is initiated, it is broadcasted to the
network. The nodes validate the transaction's authenticity, ensuring that the sender has the
necessary authority and the transaction meets the defined rules. Once validated, the
transaction is included in a new block.
Block Addition: Miners (or validators) compete to solve the mathematical puzzle associated
with a block. The first miner to solve it broadcasts the solution to the network. Other nodes
then verify the solution and, if correct, add the block to their copy of the blockchain.
Immutability: Once a block is added to the blockchain, it becomes very difficult to alter or
remove. As subsequent blocks are added, the tamper-resistant nature of the cryptographic
hashes and the decentralized distribution of copies across the network make it highly secure
and resistant to manipulation.
Decentralization: The decentralized nature of blockchain means that no single entity or
authority controls the entire network. Consensus mechanisms ensure agreement among nodes,
making it difficult for malicious actors to manipulate the system.
Transparency and Privacy: Blockchain provides transparency by allowing anyone to view the
entire transaction history. However, the identities of the participants can be pseudonymous, as
only cryptographic addresses are typically displayed. Private blockchains can restrict access
and visibility to authorized participants.

3
CSE Department 19ECS459

Explanation of how blockchain works:


You might be familiar with spreadsheets or databases. A blockchain is somewhat similar
because it is a database where information is entered and stored. But the key difference between
a traditional database or spreadsheet and a blockchain is how the data is structured and
accessed.
A blockchain consists of programs called scripts that conduct the tasks you usually would in a
database: Entering and accessing information and saving and storing it somewhere. A
blockchain is distributed, which means multiple copies are saved on many machines, and they
must all match for it to be valid.
The blockchain collects transaction information and enters it into a block, like a cell in a
spreadsheet containing information. Once it is full, the information is run through an
encryption algorithm, which creates a hexadecimal number called the hash.The hash is then
entered into the following block header and encrypted with the other information in the block.
This creates a series of blocks that are chained together.
Transaction Process
Transactions follow a specific process, depending on the blockchain they are taking place on.
For example, on Bitcoin's blockchain, if you initiate a transaction using your cryptocurrency
wallet—the application that provides an interface for the blockchain—it starts a sequence of
events. In Bitcoin, your transaction is sent to a memory pool, where it is stored and queued
until a miner or validator picks it up. Once it is entered into a block and the block fills up with
transactions, it is closed and encrypted using an encryption algorithm.

Fig1 : Bitcoin transaction process

4
CSE Department 19ECS459

2.2: Centralization vs. Decentralization, Distributed Consensus


Centralization and decentralization refer to different models of organizing power and decision-
making in a system or network. They have implications for governance, control, and resilience.
Distributed consensus, on the other hand, is a mechanism used in decentralized systems to
achieve agreement among participants.
Centralization: In a centralized system, power and decision-making authority are concentrated
in a single entity or a few entities. These entities have control over the system's operations,
rules, and data. Centralized systems often have a hierarchical structure, where decisions flow
from the top-down. Examples of centralized systems include traditional banking systems,
centralized social media platforms, and government bureaucracies. Centralization can provide
efficiency, clear accountability, and quick decision-making but may be vulnerable to single
points of failure, censorship, and lack of transparency.
Decentralization: Decentralization distributes power and decision-making authority among
multiple entities or participants. It aims to reduce reliance on a single point of control, enhance
autonomy, and promote collective decision-making. In decentralized systems, decision-making
can be distributed across various nodes, individuals, or organizations. Each participant may
have a say in the system's governance and may maintain a copy of the shared database.
Examples of decentralized systems include blockchain networks, peer-to-peer file sharing, and
decentralized autonomous organizations (DAOs). Decentralization can provide resilience,
censorship resistance, increased transparency, and community-driven governance but may face
challenges related to coordination, scalability, and decision-making efficiency.
Distributed Consensus: Distributed consensus is a mechanism used in decentralized systems
to achieve agreement among participants on the state of the system or the validity of
transactions. Consensus algorithms ensure that all participants in the network reach a common
understanding and agree on the order and validity of transactions without relying on a central
authority. These algorithms enable the system to function even in the presence of faulty or
malicious nodes. Popular consensus algorithms include Proof of Work (PoW), Proof of Stake
(PoS), and Practical Byzantine Fault Tolerance (PBFT). Distributed consensus allows
decentralized systems, such as blockchain networks, to maintain a consistent and secure state
across the network without the need for a central coordinator.
It's worth noting that decentralization can exist without distributed consensus, as in the case
of federated systems where decision-making authority is distributed, but consensus is achieved
through a subset of trusted entities. Additionally, the degree of centralization or decentralization
can vary across different systems and networks, and it is a spectrum rather than a binary
classification.

2.3: Consensus without identity using a blockchain


Consensus without identity is a concept that aims to achieve agreement on the state of a
blockchain network or the validity of transactions without revealing the true identities of the
participants involved. This approach prioritizes privacy and confidentiality while still
maintaining the integrity and security of the blockchain.
One approach to achieving consensus without identity is through the use of anonymous or
pseudonymous cryptographic identities. In this scenario, participants in the blockchain
network are represented by cryptographic keys or addresses rather than their real-world

5
CSE Department 19ECS459

identities. Transactions are signed with these cryptographic identities, ensuring their
authenticity and integrity while preserving privacy.
There are several cryptographic techniques and protocols that can enable consensus without
identity in a blockchain:
a) Zero-Knowledge Proofs (ZKPs): Zero-knowledge proofs allow one party, the prover, to
prove the validity of a statement to another party, the verifier, without revealing any
additional information. ZKPs can be used to prove knowledge of a secret without
disclosing the secret itself. By leveraging ZKPs, participants in a blockchain network can
prove the validity of their transactions or their eligibility to participate in consensus
algorithms without revealing their actual identities.

b) Ring Signatures: Ring signatures enable a participant to sign a message on behalf of a


group (or ring) of users. The signature does not reveal which specific member of the ring
produced it, thereby providing anonymity. This technique allows for consensus without
disclosing the identity of the signer.

c) Homomorphic Encryption: Homomorphic encryption allows computations to be


performed on encrypted data without decrypting it. With this technique, participants can
contribute to the consensus process by encrypting their inputs, ensuring privacy while
still allowing the network to reach agreement.

d) Confidential Transactions: Confidential transactions leverage cryptographic techniques


to conceal transaction amounts while still ensuring their validity. These transactions use
commitments and range proofs to ensure that the total input is equal to the total output,
without revealing the specific amounts involved. Confidential transactions enable
consensus without disclosing the transaction values or participant identities.
These cryptographic techniques, among others, can be used in combination to achieve
consensus without identity in a blockchain network. By preserving privacy and confidentiality,
participants can transact and participate in the blockchain without exposing their true
identities to the public. This approach is particularly relevant in scenarios where privacy is a
crucial consideration, such as financial transactions or sensitive business networks .

2.4: Incentives and proof of work


In the context of blockchain, incentives and proof of work (PoW) are closely related concepts
that play a vital role in maintaining the security and integrity of the network.
Incentives: In a blockchain network, incentives are designed to motivate participants to
contribute their computational resources and act in the best interest of the network. The most
common incentive in blockchain networks is the reward system, typically in the form of
cryptocurrency tokens. By providing rewards to participants who perform specific tasks or
contribute to the network's operations, blockchain networks incentivize participants to act
honestly and perform valuable work.

6
CSE Department 19ECS459

Proof of Work (PoW): PoW is a consensus mechanism commonly used in blockchain networks,
most notably in Bitcoin. PoW is a computationally intensive process that requires miners to
solve complex mathematical puzzles to validate transactions and create new blocks in the
blockchain. Miners compete against each other to find a solution to the puzzle, and the first
miner to solve it is rewarded with cryptocurrency tokens.
The underlying idea behind PoW is that finding a solution to the puzzle requires a significant
amount of computational work. This work serves as proof that the miner has invested a certain
amount of resources (computational power and electricity) into the network. This proof is then
used to reach a consensus on the order of transactions and the creation of new blocks. Once a
solution is found, it is broadcasted to the network, verified by other nodes, and added to the
blockchain.
The difficulty of the mathematical puzzles in PoW is adjusted dynamically based on the total
computational power of the network. This adjustment ensures that blocks are added at a
consistent rate, typically every 10 minutes in the case of Bitcoin. The difficulty adjustment
mechanism maintains the security of the network by making it increasingly difficult for a
malicious actor to control a majority of the computational power and manipulate the
blockchain.
PoW provides several benefits, including security against attacks, resistance to censorship, and
a fair and transparent way to distribute rewards. However, it also requires substantial
computational resources, leading to concerns about energy consumption and scalability.
It's worth noting that there are alternative consensus mechanisms, such as Proof of Stake (PoS)
and Delegated Proof of Stake (DPoS), that aim to address the energy consumption and scalability
limitations of PoW while still providing network security and incentives for participants. These
mechanisms allocate mining or block validation rights based on the participants' ownership or
stake in the network's cryptocurrency, rather than computational work.

2.5: Cryptocurrency
Cryptocurrency is a digital or virtual form of currency that uses cryptography for security and
operates on decentralized networks known as blockchains. Unlike traditional fiat currencies
issued by governments, cryptocurrencies are typically not controlled or regulated by any central
authority.
Some key characteristics and concepts related to cryptocurrencies:
Decentralization: Cryptocurrencies are decentralized, meaning they operate on a network of
computers (nodes) spread across the world, without a central governing body. This decentralized
nature allows for peer-to-peer transactions and removes the need for intermediaries like banks.

Blockchain Technology: Cryptocurrencies utilize blockchain technology, which is a distributed


ledger that records all transactions across the network. The blockchain ensures transparency,
immutability, and security of transactions.
Cryptographic Security: Cryptocurrencies use cryptographic techniques to secure transactions
and control the creation of new units. Public-key cryptography enables users to have a pair of
cryptographic keys: a public key for receiving funds and a private key for accessing and

7
CSE Department 19ECS459

spending those funds. This cryptographic security ensures the integrity and confidentiality of
transactions.
Token Generation: Most cryptocurrencies are generated through a process called mining or
minting. Mining involves solving complex mathematical puzzles or validating transactions to
add new blocks to the blockchain. Miners are typically rewarded with newly minted
cryptocurrency tokens as an incentive for their computational work and contribution to the
network.
Digital Scarcity: Many cryptocurrencies are designed with a limited supply to create scarcity,
similar to how finite resources like gold have value. Bitcoin, for example, has a maximum supply
of 21 million coins, which cannot be exceeded. This limited supply can contribute to the value
of cryptocurrencies.
Use Cases: Cryptocurrencies have various use cases beyond being a medium of exchange. They
can be used for investment purposes, remittances, decentralized finance (DeFi), smart
contracts, and more. Some cryptocurrencies are designed to serve specific purposes, such as
privacy-focused transactions (e.g., Monero) or facilitating decentralized applications (e.g.,
Ethereum).
Volatility: Cryptocurrencies are known for their volatility, with prices often experiencing
significant fluctuations. Factors such as market demand, regulatory changes, media attention,
and investor sentiment can impact cryptocurrency prices. This volatility can present
opportunities for investors but also poses risks.
Some well-known cryptocurrencies include Bitcoin (BTC), Ethereum (ETH), Ripple (XRP),
Litecoin (LTC), and many others. It's important to note that the cryptocurrency market is highly
dynamic, with new cryptocurrencies emerging and existing ones evolving over time.
While cryptocurrencies offer potential benefits such as financial inclusivity, borderless
transactions, and programmable money, they also come with risks, including price volatility,
regulatory uncertainties, and potential security vulnerabilities. It's crucial to conduct thorough
research, exercise caution, and understand the risks associated with cryptocurrency
investments and transactions.

2.6: NFTS
NFTs, or Non-Fungible Tokens, are a type of digital asset that represent ownership or proof of
authenticity of a unique item or piece of content, such as artwork, collectibles, music, videos,
or virtual real estate. Unlike cryptocurrencies such as Bitcoin or Ethereum, which are fungible
(interchangeable), NFTs are unique and indivisible, giving them their distinct value.
Here are some key points about NFTs:
Unique Ownership: NFTs are created and recorded on a blockchain, typically using standards
like the ERC-721 or ERC-1155 standards on the Ethereum blockchain. Each NFT has a unique
identifier and metadata that establishes its authenticity and ownership.
Digital Scarcity: NFTs leverage the blockchain's digital scarcity by ensuring that each token
represents a specific, one-of-a-kind item. This uniqueness is one of the primary drivers of their
value.

8
CSE Department 19ECS459

Ownership and Authenticity: NFTs provide a way to prove ownership and authenticity of digital
assets. The blockchain's immutability and transparent record-keeping allow anyone to verify
the ownership and transaction history of an NFT.
Interoperability: NFTs can be bought, sold, and traded on various online marketplaces that
support their standards. These marketplaces act as platforms for creators and collectors to
engage in NFT transactions.
Use Cases: NFTs have gained significant attention in the art world, enabling artists to tokenize
and sell their digital artwork directly to collectors. However, NFTs are also used in other
domains, including gaming, sports collectibles, virtual real estate, virtual goods, and more. They
can represent ownership of in-game items, exclusive experiences, or limited-edition digital
content.
Royalties and Secondary Sales: NFTs can be programmed with smart contracts that allow
creators to earn royalties on subsequent sales of their NFTs. This feature ensures that artists
can continue to benefit from the increasing value of their work in the secondary market.
Criticisms and Environmental Impact: NFTs have faced criticisms regarding their environmental
impact due to the energy consumption associated with blockchain transactions. Some
blockchain networks, like Ethereum, are transitioning to more energy-efficient consensus
mechanisms to mitigate these concerns.
It's important to note that while NFTs have gained significant popularity and have been
associated with high-profile sales and media attention, the NFT market can be volatile, and
there are risks associated with investing in or trading NFTs. Additionally, due diligence is crucial
when engaging in the NFT space, as issues such as copyright infringement and ownership
disputes can arise.
Ultimately, NFTs represent a new frontier for the ownership and monetization of digital assets,
providing new opportunities for creators, collectors, and investors in the digital realm

2.7: Mining
Mining, in the context of cryptocurrency, refers to the process of validating and adding new
transactions to the blockchain, as well as creating new units of the cryptocurrency as a reward
for this work. It is a crucial component of many blockchain networks, particularly those that
use proof-of-work (PoW) consensus mechanisms like Bitcoin.
Here's an overview of how mining works in cryptocurrency:
Transaction Validation: Miners play a role in verifying the validity of transactions submitted to
the network. They check the authenticity of each transaction by confirming that the sender has
sufficient funds, the transaction adheres to the network's rules, and there is no attempt at
double spending (using the same funds in multiple transactions).

Block Formation: Validated transactions are grouped together into blocks, which serve as
containers for storing and organizing transactions in the blockchain. Miners compete to create
new blocks by solving complex mathematical puzzles that require significant computational
power. These puzzles are designed to be difficult to solve but easy to verify.

9
CSE Department 19ECS459

Proof-of-Work: In a PoW system, miners must find a solution (known as a "nonce") to the
mathematical puzzle by iterating through various possibilities. The solution must meet specific
criteria, such as producing a hash value that starts with a certain number of zeros. This process
involves repeatedly guessing and checking until a miner finds a valid solution.
Block Reward: Once a miner finds a valid solution, they can broadcast it to the network. Other
nodes in the network verify the solution and, if correct, add the new block to their copy of the
blockchain. As a reward for their computational work and contribution to the network's
security, the miner who successfully mines a block is typically awarded newly minted
cryptocurrency tokens. This reward incentivizes miners to participate and secure the network.
Difficulty Adjustment: The difficulty of the mathematical puzzles is adjusted periodically to
maintain a consistent rate of block creation. As more miners join the network and
computational power increases, the puzzles become more challenging to solve. Conversely, if
miners leave the network, the difficulty may be adjusted downward to ensure a consistent block
creation rate.
Network Consensus: The consensus mechanism of PoW relies on the majority of miners acting
honestly and competing fairly. If a single miner or group of miners controls more than 50% of
the network's computational power, it could potentially compromise the security of the
blockchain through attacks like the 51% attack.
It's important to note that not all cryptocurrencies use mining or PoW as their consensus
mechanism. Some cryptocurrencies employ alternative mechanisms like proof-of-stake (PoS) or
delegated proof-of-stake (DPoS), which allocate the ability to mine or validate blocks based on
the participants' ownership or stake in the cryptocurrency itself.
Mining can be resource-intensive, requiring specialized hardware, substantial electricity
consumption, and cooling systems. It has also raised concerns about its environmental impact
due to the energy consumption associated with solving the mathematical puzzles.

3. Types of blockchains
3.1 Public Blockchain
A public blockchain is a type of blockchain network that is open to anyone and allows for
participation, transparency, and decentralized consensus. It is a distributed ledger system that
is accessible to the public, enabling anyone to join the network, validate transactions, and
maintain a copy of the blockchain's entire history.
Here are some key characteristics of public blockchains:
Open Participation: Public blockchains allow anyone to participate in the network as a node,
miner, or validator. There are no restrictions on who can join or access the blockchain, making
it permissionless and inclusive.
Decentralization: Public blockchains operate in a decentralized manner, with no central
authority controlling the network. Consensus is achieved through mechanisms like proof-of-
work (PoW) or proof-of-stake (PoS), where multiple participants contribute to validating and
confirming transactions.
Transparency: Public blockchains provide transparency by storing all transaction data on the
blockchain, which is publicly accessible and verifiable. Anyone can inspect the blockchain's
history, view transaction details, and verify the integrity of the data.

10
CSE Department 19ECS459

Security: Public blockchains rely on cryptographic techniques to secure transactions and


maintain the integrity of the network. Consensus mechanisms, such as PoW or PoS, ensure
that the majority of participants agree on the order and validity of transactions, making it
difficult for malicious actors to tamper with the blockchain.
Cryptocurrency and Incentives: Many public blockchains have native cryptocurrencies
associated with them, which serve as a medium of exchange and provide incentives for
participants. Miners or validators are rewarded with cryptocurrency tokens for their work in
maintaining the network's security and integrity.
Trustlessness: Public blockchains aim to establish trust in a trustless environment. By relying
on cryptographic algorithms, consensus mechanisms, and decentralized governance, public
blockchains provide a trustless system where participants can interact and transact without
relying on a central authority.
Use Cases: Public blockchains have a wide range of use cases, including digital currencies (e.g.,
Bitcoin), smart contracts and decentralized applications (e.g., Ethereum), supply chain
tracking, identity verification, decentralized finance (DeFi), and more. The open nature of public
blockchains allows for innovation and the development of diverse applications.
It's important to note that public blockchains can face challenges such as scalability,
transaction throughput, and energy consumption. However, they offer advantages in terms of
censorship resistance, robustness against attacks, and community-driven governance. Public
blockchains have gained significant attention and popularity, enabling new forms of economic
and social interactions on a global scale.

3.2 Private Blockchain


A private blockchain, also known as a permissioned blockchain, is a type of blockchain network
where access and participation are restricted to a specific group of participants. Unlike public
blockchains that are open to anyone, private blockchains are limited to a select number of
authorized entities, such as organizations, consortiums, or individuals with permission to join
the network.

Here are some key characteristics of private blockchains:

Restricted Access: Private blockchains require permission to join and participate in the network.
The network's participants are typically known and verified entities, such as trusted
organizations, partners, or members of a consortium. Access controls and identity management
mechanisms are implemented to ensure only authorized participants can interact with the
blockchain.

Centralized or Consortium Governance: Private blockchains often have centralized governance,


where a single entity or a consortium of entities controls the decision-making process. This
governance structure allows for more efficient decision-making and faster consensus compared
to decentralized public blockchains.

11
CSE Department 19ECS459

Controlled Consensus: Private blockchains may use consensus mechanisms tailored to the
specific needs and requirements of the participants. These mechanisms can vary from
traditional Byzantine Fault Tolerant (BFT) algorithms to more efficient consensus algorithms
like Practical Byzantine Fault Tolerance (PBFT) or Raft. Consensus is achieved among the
authorized participants, and they collectively maintain the blockchain's integrity.

Enhanced Privacy: Privacy is a significant consideration in private blockchains. As the


participants are known and permissioned, privacy controls can be implemented to restrict
access to sensitive information and transactions. Data encryption, permissioned visibility, and
selective disclosure of information are commonly employed to ensure privacy within the
network.

Scalability and Performance: Private blockchains generally offer higher scalability and
performance compared to public blockchains. With a limited number of participants and a
controlled consensus process, private blockchains can handle a higher transaction throughput
and achieve faster confirmation times.

Use Cases: Private blockchains are often used in enterprise settings, where organizations need
to share and transact data securely with known parties. Industries such as supply chain
management, finance, healthcare, and government sectors can benefit from the transparency,
efficiency, and auditability offered by private blockchains. They enable streamlined processes,
reduced reconciliation efforts, and increased trust among participants.

Trade-Offs: While private blockchains offer benefits like enhanced privacy, scalability, and faster
consensus, they lack the decentralized and censorship-resistant nature of public blockchains.
The reliance on trusted entities for governance and access control can introduce concerns about
centralization and potential collusion among participants.

It's worth noting that there is a spectrum of blockchain networks, ranging from fully public to
fully private, with hybrid models in between. These hybrid models, known as consortium or
federated blockchains, combine elements of public and private blockchains by allowing a
controlled set of participants to maintain and validate the blockchain.

The choice between a public or private blockchain depends on the specific requirements, use
cases, and desired level of decentralization, privacy, and control for the participants involved.

3.3 Semi-Private Blockchain


A semi-private blockchain, also known as a hybrid blockchain, is a type of blockchain network
that combines elements of both public and private blockchains. It seeks to strike a balance
between the open nature of public blockchains and the restricted access of private blockchains.
Here are some key characteristics of semi-private blockchains:

12
CSE Department 19ECS459

Access Controls: Similar to private blockchains, semi-private blockchains have access controls
that restrict participation to a specific group of authorized participants. These participants are
typically known entities or organizations that have been granted permission to join the network.
Access controls may include user authentication, identity verification, and permissioned
participation.
Multiple Levels of Access: Semi-private blockchains can have different levels of access and
participation. Some participants may have read-only access to the blockchain, while others have
permission to add new transactions, validate blocks, or participate in the consensus process.
The varying levels of access allow for different roles and responsibilities within the network.
Consortium Governance: Semi-private blockchains often operate under a consortium
governance model. A consortium consists of multiple organizations or entities that collectively
make decisions about the blockchain's rules, consensus mechanisms, and governance
structure. Consortium governance ensures that participating organizations have a say in the
network's operations.
Hybrid Consensus Mechanisms: Semi-private blockchains may utilize a consensus mechanism
that combines elements of both public and private blockchains. For example, they could use a
combination of proof-of-stake (PoS) and proof-of-authority (PoA) consensus algorithms. This
hybrid approach enables faster transaction confirmation times and improved scalability while
maintaining some degree of decentralization and security.
Partial Transparency: While semi-private blockchains are not fully open like public blockchains,
they can provide varying levels of transparency depending on the permissions granted to
participants. Participants with permission to view the blockchain can access and verify
transactions, but some information may be hidden or encrypted to maintain privacy or protect
sensitive data.
Use Cases: Semi-private blockchains are well-suited for scenarios where a group of trusted
entities needs to collaborate and transact securely while maintaining some control over the
network. Use cases include supply chain management, interbank transactions, industry
consortia, and government collaborations. Semi-private blockchains enable participants to
share data, streamline processes, and enhance trust while preserving privacy and
confidentiality.
Customization: Semi-private blockchains offer flexibility and customization options for the
participants. The network's rules, smart contract functionality, and consensus mechanisms
can be tailored to meet the specific requirements of the consortium members. This
customization allows for efficient collaboration and integration among the participating entities.

Semi-private blockchains aim to find a middle ground between the openness and
decentralization of public blockchains and the controlled access and privacy of private
blockchains. They provide a way for trusted entities to collaborate securely and efficiently while
maintaining some level of control and privacy within the network.

3.4 Sidechains
Sidechains are separate blockchain networks that are interoperable with and connected
to a primary blockchain, often referred to as the main chain or parent chain. They

13
CSE Department 19ECS459

provide a way to extend the functionality and capabilities of the main chain while
keeping the core blockchain lean and efficient.
Here are some key points about sidechains:
Functionality Expansion: Sidechains enable the development of new features,
applications, or use cases that may not be feasible or appropriate to implement directly
on the main chain. By creating a separate sidechain, developers can experiment,
innovate, and introduce new protocols, consensus mechanisms, or smart contract
functionality without affecting the main chain's operation.
Two-Way Peg: Sidechains are typically connected to the main chain through a two-way
peg mechanism. This allows for the movement of assets or tokens between the main
chain and the sidechain in a secure and verifiable manner. When assets are moved from
the main chain to the sidechain, they are locked on the main chain, and an equivalent
amount is issued on the sidechain. The reverse process can also be performed to move
assets back to the main chain.
Independent Governance and Consensus: Sidechains can have their own governance
structures and consensus mechanisms that differ from the main chain. This flexibility
allows sidechains to tailor their governance models and consensus algorithms based on
their specific requirements, use cases, or desired levels of decentralization.
Scalability and Performance: One of the key motivations behind sidechains is to address
the scalability and performance limitations of the main chain. By offloading certain
transactions or computational tasks to a sidechain, the main chain can operate more
efficiently with reduced congestion and faster confirmation times. Sidechains can
handle a subset of transactions, thus improving overall throughput and scalability.
Specific Use Cases: Sidechains can be designed for specific use cases or industries. For
example, a sidechain could be created for decentralized finance (DeFi) applications,
gaming, supply chain management, or identity verification. Each sidechain can have its
own set of rules, protocols, and functionalities optimized for its intended purpose.
Interoperability: Interoperability is a critical aspect of sidechains. It allows for the
seamless transfer of assets and data between the main chain and sidechains, as well
as between different sidechains. Interoperability protocols and mechanisms enable
communication and interaction across different chains, facilitating the flow of
information and value between them.
Security Considerations: Sidechains introduce additional security considerations. While
they operate independently, they rely on the main chain's security for the initial asset
lock and subsequent pegging. Security measures like audits, multi-signature controls,
and consensus mechanisms must be carefully designed and implemented to ensure the
integrity and safety of the sidechain and its interactions with the main chain.
Sidechains offer a way to expand the capabilities and scalability of blockchain networks
by creating separate, interconnected chains. They provide a sandbox environment for
innovation and customization while maintaining compatibility and interoperability with

14
CSE Department 19ECS459

the main chain. Sidechains enable blockchain technology to be more adaptable to


diverse use cases and provide solutions to specific challenges in various industries.
3.5 Blockchain Vulnerabilities
While blockchain technology offers several advantages, it is not without vulnerabilities. Here
are some common vulnerabilities associated with blockchain systems:
51% Attack: In proof-of-work (PoW) blockchains, a 51% attack occurs when a single entity or
a group of colluding entities controls more than 50% of the network's computational power.
This control allows them to manipulate the blockchain by excluding or modifying
transactions, double-spending, or disrupting the consensus process.
Sybil Attack: A Sybil attack involves creating multiple fake identities or nodes to gain control
over a network. By controlling a significant portion of the network's nodes, an attacker can
influence the consensus process, propagate false information, or disrupt the network's
operation.
Smart Contract Vulnerabilities: Smart contracts, which are self-executing programs running on
a blockchain, can contain coding errors or vulnerabilities. These vulnerabilities can be exploited
to manipulate the contract's behavior, steal funds, or cause unintended consequences.
Examples of such vulnerabilities include reentrancy attacks, integer overflow/underflow, and
unhandled exceptions.

Private Key Vulnerabilities: Blockchain systems rely on cryptographic keys to sign


transactions and prove ownership of assets. If a private key is compromised or stolen, an
attacker can gain unauthorized access to the associated assets and manipulate transactions.

DDoS Attacks: Blockchain networks can be susceptible to Distributed Denial of Service


(DDoS) attacks, where an attacker overwhelms the network with a massive volume of requests
or transactions. This can cause congestion, slow down transaction processing, or even render
the network inaccessible.

Governance and Consensus Manipulation: If the governance or consensus mechanisms of a


blockchain are not designed securely or are controlled by a small group of entities, they can
be manipulated for personal gain or to subvert the system's integrity.

Implementation and Software Vulnerabilities: Blockchain systems are built using software,
and like any software, they can have bugs or vulnerabilities. Exploiting these vulnerabilities
can lead to unauthorized access, data manipulation, or disruption of the blockchain network.

Privacy Concerns: While blockchain provides transparency, some blockchain networks may
leak sensitive information if proper privacy measures are not implemented. Transaction
details, addresses, and other data stored on the blockchain may be visible to anyone,
compromising user privacy.

15
CSE Department 19ECS459

It's important to note that blockchain technology continues to evolve, and researchers,
developers, and security experts actively work to identify and mitigate vulnerabilities. Regular
security audits, code reviews, and best practices can help enhance the security and resilience
of blockchain systems. Additionally, advancements like improved consensus algorithms, zero-
knowledge proofs, and secure smart contract languages are being developed to address these
vulnerabilities and enhance the overall security of blockchain technology.

16

You might also like